<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: People hacking, is this possible? in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17901#M802</link>
    <description>&amp;gt; Caute_cautim (Advocate I) posted a new topic in Tech Talk on 01-13-2019 01:54 PM&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Subject: People hacking, is this possible?&lt;BR /&gt;&lt;BR /&gt;We aleady hack people. It's called "social engineering" ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;The World Youth Congress was the greatest thing that ever&lt;BR /&gt;happened [to Ghana], so I was surprised to learn [later] that it&lt;BR /&gt;was a CIA front. I may be the only person you will ever meet who&lt;BR /&gt;is indebted to the CIA. - Stephen Lewis&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
    <pubDate>Mon, 14 Jan 2019 18:46:22 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2019-01-14T18:46:22Z</dc:date>
    <item>
      <title>People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17883#M799</link>
      <description>&lt;P&gt;We must know it will become possible in the foreseeable future?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.grandrapidsmn.com/opinion/columnists/can-a-person-be-hacked/article_12b39370-15d1-11e9-a653-6f4ebed4ee70.html" target="_blank"&gt;https://www.grandrapidsmn.com/opinion/columnists/can-a-person-be-hacked/article_12b39370-15d1-11e9-a653-6f4ebed4ee70.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.washingtonpost.com/sf/national/2016/02/19/brain-hacking-the-minds-biology/?noredirect=on&amp;amp;utm_term=.6b00264ec17b" target="_blank"&gt;https://www.washingtonpost.com/sf/national/2016/02/19/brain-hacking-the-minds-biology/?noredirect=on&amp;amp;utm_term=.6b00264ec17b&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.labroots.com/trending/videos/12946/brain-hacking-it" target="_blank"&gt;https://www.labroots.com/trending/videos/12946/brain-hacking-it&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://www.rt.com/news/442800-brain-implants-hacking-security/" target="_blank"&gt;https://www.rt.com/news/442800-brain-implants-hacking-security/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, it is possible, and it will happen but what will the consequences be?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:04:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17883#M799</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17901#M802</link>
      <description>&amp;gt; Caute_cautim (Advocate I) posted a new topic in Tech Talk on 01-13-2019 01:54 PM&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Subject: People hacking, is this possible?&lt;BR /&gt;&lt;BR /&gt;We aleady hack people. It's called "social engineering" ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;The World Youth Congress was the greatest thing that ever&lt;BR /&gt;happened [to Ghana], so I was surprised to learn [later] that it&lt;BR /&gt;was a CIA front. I may be the only person you will ever meet who&lt;BR /&gt;is indebted to the CIA. - Stephen Lewis&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Mon, 14 Jan 2019 18:46:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17901#M802</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-01-14T18:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17906#M803</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp; Nice one, a bit of lateral thinking.&amp;nbsp;&amp;nbsp; Yes, I would agree in terms of influencing the perpetrators required outcomes via the victim, to convince to do what you want them to do.&amp;nbsp; It does have contextual connections.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thoughts on people hacking is more a direct influence on their memory, neural network, which in essence could by achieved through hypnosis or under the influence as well.&amp;nbsp;&amp;nbsp; But more likely to be something they are wearing, which detects electrical behaviour within the brain or is able to influence more directly a change in behaviour or desired outcome.&amp;nbsp;&amp;nbsp; Example:&amp;nbsp;&amp;nbsp; an unethical neurologist or perhaps a form of mind altering experience and not by drugs etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jan 2019 19:24:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17906#M803</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-14T19:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17939#M805</link>
      <description>No - I don't accept this as a solution - its a debate.</description>
      <pubDate>Tue, 15 Jan 2019 18:34:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/17939#M805</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-15T18:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/18041#M814</link>
      <description>&lt;P&gt;This concept is at least 50 years old. See both the MK ULTRA project at CIA, as well as other discussions on using LSD in the 1960's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further, the full range of influence operations trace back to Edward Bernays' book &lt;STRONG&gt;Propaganda&lt;/STRONG&gt; from the 1920s and the successor commercial activities in the advertising and marketing world that we refer to as Madison Avenue here in the USA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, we can and have been hacking people for years. Adding chemistry, biochemistry, and neuroscience components as the technology progresses is just that... expected progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Jan 2019 15:08:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/18041#M814</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-01-19T15:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: People hacking, is this possible?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/18051#M817</link>
      <description>&lt;P&gt;I think it actually goes back further than the 1950's.&amp;nbsp; I believe the USA carried on with research that WWII and the Germans, were doing experimenting with their own troops.&amp;nbsp;&amp;nbsp; It looks thought most of them were on a high through the later years of WWII, from what history tells us.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.history.com/news/inside-the-drug-use-that-fueled-nazi-germany" target="_blank"&gt;https://www.history.com/news/inside-the-drug-use-that-fueled-nazi-germany&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Drug_policy_of_Nazi_Germany" target="_blank"&gt;https://en.wikipedia.org/wiki/Drug_policy_of_Nazi_Germany&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the context I was pointing towards was the ability to influence humans beings via the use of :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.researchgate.net/publication/301335762_Hacking_the_brain_brain-computer_interfacing_technology_and_the_ethics_of_neurosecurity" target="_blank"&gt;https://www.researchgate.net/publication/301335762_Hacking_the_brain_brain-computer_interfacing_technology_and_the_ethics_of_neurosecurity&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which points towards Neurosecurity, and there to techniques to malicious brain hacking intentionally, other than using drugs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there is an interesting issue about mental privacy as well - which may also come to asset itself as we progress.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theguardian.com/science/2017/apr/26/new-human-rights-to-protect-against-mind-hacking-and-brain-data-theft-proposed" target="_blank"&gt;https://www.theguardian.com/science/2017/apr/26/new-human-rights-to-protect-against-mind-hacking-and-brain-data-theft-proposed&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sat, 19 Jan 2019 22:55:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/People-hacking-is-this-possible/m-p/18051#M817</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-01-19T22:55:45Z</dc:date>
    </item>
  </channel>
</rss>

